Open Access Open Access  Restricted Access Subscription Access
Open Access Open Access Open Access  Restricted Access Restricted Access Subscription Access

Detection of Malicious Nodes in Wireless Sensor Network


Affiliations
1 Department of Computer Science and Engineering, Gnanamani College of Technology, India
2 Department of Electronics and Communication Engineering, Sri Satya Sai University of Technology, India
     

   Subscribe/Renew Journal


Wireless Sensor Network (WSN) can be used as an important concept to reduce the redundancy and energy consumption. To optimize the wireless sensor networks for secured data transmission both at cluster head and base station, data aggregation is needed. The existence time of sensor network diminishes due to energy inefficient nodes for data aggregation. Henceforth aggregation process in WSN ought to be advanced in energy efficient way. Data aggregation is performed in every router while forwarding data. It is difficult to identify and isolate the compromised nodes so as to abstain from being deceived by the distorted data infused by the enemy through compromised nodes. In any case, it is trying to secure the flat topology network effectively in light of the poor adaptability and high communication overhead. We discuss a mechanism that distinguishes malicious nodes by the collaboration of appropriate nodes and logically isolates the recognized, malicious nodes from remote sensor systems. Also this paper describes about the attacks and security goals in the WSN.

Keywords

Wireless Sensor Network, Data Aggregation, Malicious Node, Security Goals.
Subscription Login to verify subscription
User
Notifications
Font Size

  • Eiji Nii, Takamasa Kitanouma, Naotoshi Adachi and Yasuhisa Takizawa, “Cooperative Detection for Falsification and Isolation of Malicious Nodes for Wireless Sensor Networks in Open Environment”, Proceedings of 7th Asia Pacific IEEE Conference on Microwave, pp. 1-8, 2017.
  • V. Porkodi, A.S. Mohammed, V. Manikandan, “Retransmission DBTMA Protocol with Fast Retransmission Strategy to Improve the Performance of MANETs”, IEEE Access, Vol. 7, pp. 85098-85109, 2019.
  • P. Padmaja and G.V. Marutheswar, “Detection of Malicious Node in Wireless Sensor Network”, Proceedings of IEEE 7th International Conference on Advance Computing, pp. 1-7, 2017.
  • A.S. Mohammed and V. Porkodi, “Improved Enhanced Dbtma with Contention-Aware Admission Control to Improve the Network Performance in Manets”, CMC Techscience Journal, Vol. 6, No. 2, pp. 435-454, 2019.
  • C. Karlof, N. Sastry and D. Wagner, “TinySec: A Link Layer Security Architecture for Wireless Sensor Networks”, Proceedings of 2nd International Conference on Embedded Networked Sensor Systems, pp. 1-5, 2004.
  • S. Roy, M. Conti, S. Setia and S. Jajoida, “Secure Data Aggregation in Wireless Sensor Networks: Filtering out the Attacker's Impact”, IEEE Transactions on Information Forensics and Security, Vol. 9, No. 4, pp. 681-694, 2014.
  • W.R. Pires, T.H. De Figueiredo, H.C. Wong and A.A.F. Lourerio, “Malicious node detection in wireless sensor networks”, Proceedings of IEEE 18th International Symposium on Parallel and Distributed Processing, pp. 26-30, 2004.
  • B. Rajasekaran and C. Arun, “Detection of Malicious Nodes in Wireless Sensor Networks based on Features using Neural Network Computing Approach”, International Journal of Recent Technology and Engineering, Vol. 7, No. 4, pp. 188-192, 2018.
  • H. Yang and F. Cheng, “A Novel Wireless Sensor Networks Malicious Node Detection Method”, Proceedings of International Conference on Security and Privacy in New Computing Environments, pp. 697-706, 2019.
  • J. Lopez, R. Roman, I. Agudo and C. Fernandez-Gago, “Trust Management Systems for Wireless Sensor Networks: Best Practices”, Computer Communications, Vol. 33, No. 9, pp. 1086-1093, 2010.

Abstract Views: 224

PDF Views: 0




  • Detection of Malicious Nodes in Wireless Sensor Network

Abstract Views: 224  |  PDF Views: 0

Authors

M. Babu
Department of Computer Science and Engineering, Gnanamani College of Technology, India
M. Ramkumar
Department of Computer Science and Engineering, Gnanamani College of Technology, India
M. Shenbagapriya
Department of Electronics and Communication Engineering, Sri Satya Sai University of Technology, India

Abstract


Wireless Sensor Network (WSN) can be used as an important concept to reduce the redundancy and energy consumption. To optimize the wireless sensor networks for secured data transmission both at cluster head and base station, data aggregation is needed. The existence time of sensor network diminishes due to energy inefficient nodes for data aggregation. Henceforth aggregation process in WSN ought to be advanced in energy efficient way. Data aggregation is performed in every router while forwarding data. It is difficult to identify and isolate the compromised nodes so as to abstain from being deceived by the distorted data infused by the enemy through compromised nodes. In any case, it is trying to secure the flat topology network effectively in light of the poor adaptability and high communication overhead. We discuss a mechanism that distinguishes malicious nodes by the collaboration of appropriate nodes and logically isolates the recognized, malicious nodes from remote sensor systems. Also this paper describes about the attacks and security goals in the WSN.

Keywords


Wireless Sensor Network, Data Aggregation, Malicious Node, Security Goals.

References